Platform capabilities

Six vectors of defense.
One platform to run them all.

Threat intelligence, active defense, machine-learning profiling, uptime monitoring, DDoS and bot mitigation, domain and email intelligence - unified, integrated, and built to make each vector stronger because they share the same brain.

Vector 1

Threat Intelligence

The foundation of proactive defense. Know your adversaries before they know your attack surface.

Risk scoring

Every record gets a composite risk score derived from abuse history, network reputation, behavioral patterns, and known attack campaigns. Scores update continuously as new intelligence arrives.

Geolocation & attribution

Precise geolocation across 230+ countries. ISP identification, ASN mapping, and hosting-provider attribution for every record in the database.

Behavioral analysis

Pattern recognition across 224M+ records identifies scanning behavior, brute-force campaigns, credential stuffing, and coordinated attack infrastructure.

70+ public sources, plus our own

Continuously ingested from 70+ public threat-intelligence feeds and our own sensor network deployed on real infrastructure. Aggregated, deduplicated, and scored - no manual intervention.

Live sensor catches

Every attack against our own protected infrastructure becomes a labeled observation. New IPs are profiled and propagated in real time - the customers we defend make each other safer.

Export to your stack

Export threat data in standard formats for integration with your existing SIEM, firewall rules, or custom tooling. API and bulk export both supported.

Refresh as fast as the threat moves

Stale blocklists are worse than no blocklists. Panthero refreshes every record at the cadence its threat category deserves - from real-time profiling of brand-new attackers all the way to long-lived malicious networks revalidated up to every 30 days. No flat schedules. No blanket TTLs.

Threat category Refresh window
Live sensor catches (brand-new attackers) Real-time
Active brute-force attackers (SSH, FTP, IMAP, mail, SIP) Hourly
Web attackers and scanners Every few hours
Anonymous infrastructure (Tor, proxies, VPNs) Every few hours
Botnets, command-and-control, malware infrastructure Daily
Spam and abuse sources Daily
Long-lived malicious networks (hijacked netblocks) Up to 30 days

Vector 2

Active Defense

Block threats before they reach your application layer. The modern descendant of decades of battle-tested firewall scripts, packaged for the way you actually deploy software today.

django-panthero

A drop-in middleware for Django (and any Python framework that speaks WSGI or ASGI). Install with pip, add one line to your middleware list, and every request is verified against the full Panthero intelligence in real time.

panthero-agent (.deb)

A Debian package for any Linux server. Installs in seconds, enforces at the kernel layer with ipset, and reports back to your dashboard. Think fail2ban, but exponentially broader and continuously updated from our intelligence pipeline.

Real-time enforcement

Every request is checked against the live database before it touches your application. Verdicts in under one millisecond on the decision engine, with built-in caching for hot-path workloads.

Granular allowlists

Per-host IP and CIDR allowlists. Trusted partners, internal services, and known-good crawlers bypass threat checks without weakening your security posture.

Traffic logging

Every check creates an auditable record. Full request metadata, the risk score that drove the decision, and the action taken - stored for compliance reporting and forensic analysis.

Per-host policies

Different services need different defaults. Set risk thresholds, allowlists, rate limits, and monitor-only rollout per host. Multi-server environments managed from one dashboard.

Vector 3

ML Profiling & Scoring

A production machine-learning model scores every source by what it is trying to do, not just where it comes from. Behavioral profiling that gets sharper with every observation.

In production since 2018

The first ML model was built in 2013, before Panthero existed. The current production model has been scoring traffic since 2018 - the same year Panthero launched. Continuously refined ever since.

Intent classification

Sources are profiled by behavior - brute-forcer, scanner, spammer, scraper, exploit attempt, credential stuffer. Knowing the why drives smarter defaults than knowing only the where.

Continuous learning

Every blocked request from our sensor network becomes a labeled training example. The model gets sharper as the platform grows - and every customer benefits, on every plan, immediately.

Vector 4

Uptime & Health Monitoring

Continuous visibility into your infrastructure health. Know the moment something goes wrong - or is about to.

Heartbeats

Configurable health checks at intervals from 30 seconds to 30 minutes. HTTP, HTTPS, TCP, and ICMP probes with customizable expected responses and timeout thresholds.

Multi-location probes

Monitor from multiple geographic locations to detect regional outages and routing issues. Cross-reference results to distinguish local problems from global ones.

Instant alerts

Downtime notifications via email, Slack, and webhooks. Configurable escalation policies with retry logic that eliminates false positives before alerting your team.

Response-time tracking

Millisecond-precision response-time measurement with historical trends. Identify performance degradation before it becomes an outage.

Availability reports

Monthly and custom-period availability reports with SLA calculations. Exportable for stakeholder reporting and compliance documentation.

Status pages

Public and private status pages for your services. Communicate uptime to your customers with branded, real-time dashboards powered by your monitoring data.

Vector 5

DDoS & Bot Mitigation

Volumetric and application-layer attack detection paired with behavioral fingerprinting. Stop the flood and tell humans from automation - in the same pass.

Volumetric detection

Traffic analysis identifies anomalous volume patterns at the edge. Automated mitigation triggers before your services feel the impact.

Application-layer detection

Slow-loris, request floods, and protocol-abuse patterns detected at the request level. Layer-7 attacks that bypass volumetric filters get caught here.

Behavioral fingerprinting

Honeypot fields, request timing, header anomalies, and challenge logic working together. Separates legitimate users from automated threats without breaking real users.

Vector 6

Domain & Email Intelligence

Threats don't stop at IP addresses. Catch the look-alike domains targeting your brand and the malicious senders trying to slip past your filters.

Typosquat detection

Fuzzy matching catches domain typosquatting, homoglyph attacks, and look-alike domains targeting your brand before they reach your customers.

Malicious sender intelligence

Email senders scored against the same intelligence engine that powers IP scoring. Catch spam, phishing, and compromised accounts before they hit your inbox.

SIEM export

Push domain and email events into your SIEM in standard formats for unified investigation workflows. Connect Panthero's intelligence to the rest of your security stack.

API & delivery

One API. All six vectors.

Production-grade API designed for high-throughput workloads. Secure by default, fast by design - and the same API powers every vector above.

HMAC authentication

Request-level authentication using HMAC-SHA256 signatures. Every API call is cryptographically verified - no bearer tokens to leak, no sessions to hijack.

Sub-millisecond decisions

Verdicts in under one millisecond on the decision engine. End-to-end latency depends on your network path to our EU regions, but the engine itself never gets in your way.

Stateless sessions

Short-lived JWT tokens for session management with automatic refresh. Scales horizontally without session store dependencies.

Technical specifications

Protocol HTTPS (TLS 1.3)
Authentication HMAC-SHA256 + JWT
Response format JSON
Rate limiting Per-host configurable
Decision engine < 1ms
Hosting regions Across Europe
Compliance GDPR
Threat records 224M+

See it in action

Start free. Move to Pay-as-you-go when you grow. No commitments, no minimums.